- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
目 录
1 公钥管理 ······················································································································ 1-1
1.1 简介 ························································································································ 1-1
1.2 公钥管理配置任务简介 ································································································· 1-2
1.3 配置本地非对称密钥对 ································································································· 1-2
1.3.1 生成本地非对称密钥对 ························································································ 1-2
1.3.2 显示或导出本地非对称密钥对中的主机公钥 ····························································· 1-3
1.3.3 销毁本地非对称密钥对 ························································································ 1-4
1.4 配置远端主机的公钥 ···································································································· 1-5
1.5 公钥管理显示和维护 ···································································································· 1-6
1.6 公钥管理典型配置举例 ································································································· 1-6
1.6.1 手工配置远端主机的公钥 ····················································································· 1-6
1.6.2 从公钥文件中导入远端主机的公钥 ········································································· 1-8
i
1 公钥管理
1.1 简介
如 图 1-1 所示,为了保证数据在网络中安全传输、不被攻击者非法窃听和恶意篡改,发送方在发送
数据之前需要对数据进行加密处理,即通过一定的算法,利用密钥将明文数据变换为密文数据;接
收方接收到密文数据后,需要对其进行解密处理,即通过一定的算法,利用密钥将密文数据恢复为
明文数据,以获得原始数据。其中,密钥是一组特定的字符串,是控制明文和密文转换的唯一参数,
起到“钥匙”的作用。
图1-1 加密和解密转换关系示意图
发送方 密钥 密钥 接收方
明文 密文
您可能关注的文档
- 01-H3C_EVI典型配置举例.pdf
- 01-H3C_EVPN数据中心通过MPLS_L3VPN网络互联典型配置举例.pdf
- 01-H3C_FCoE典型配置举例.pdf
- 01-H3C_IRF典型配置举例.pdf
- 01-H3C_MAC地址表典型配置举例.pdf
- 01-H3C_OpenFlow典型配置举例.pdf
- 01-H3C_RBAC典型配置举例.pdf
- 01-H3C_VXLAN典型配置举例.pdf
- 01-H3C_静态组播MAC地址配置举例.pdf
- 01-基础配置举例-H3C_ISSU典型配置举例.pdf
- 初中英语人教版七年级上册第四单元Where is my schoolbag ! Section A .ppt
- 初中英语人教版七年级上册第四单元Where is my schoolbag Section B 2.ppt
- 初中英语人教版七年级下册 Unit 6 I'm watching TV. Section A 11a.pptx
- 注册土木工程师培训课件.ppt
- 初中生物济南版七年级上册第一章奇妙的生命现象 第三节生物学的探究方法.ppt
- 初中英语人教版七年级上册第四单元Where is my schoolbag Section B 2.pptx
- 注册安全工程师案例课件.ppt
- 初中物理人教版八年级上册第二章第4节噪声的危害和控制课件(共19张PPT).pptx
- 注册安全工程师王阳课件.ppt
- 初中数学青岛版八年级上2.4《线段的垂直平分线》课件(16张PPT).ppt
最近下载
- 解读NCCN临床实践指南:中枢神经系统肿瘤(2025.v2)PPT课件.pptx VIP
- T_CAB 0115—2021_儿童书包_标准.pdf VIP
- 聚合氯化铝使用方法及注意事项.docx VIP
- 2025年医务科工作总结暨工作计划.docx
- 高边坡工程施工安全评估报告.pdf VIP
- 金属加工软件:HyperMILL二次开发_(11).HyperMILL项目案例分析.docx VIP
- 薄膜材料性能表征方法介绍.ppt VIP
- IPC-TM-650-2.3.28B-中英文完整版.pdf VIP
- GB 7718-2025《预包装食品标签通则》解读.pptx VIP
- 勿忘国殇 吾辈自强——国家公祭日主题班会优质课件.pptx VIP
原创力文档


文档评论(0)